Flylib.com
Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications
Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications
ISBN: 0201784203
EAN: 2147483647
Year: 2003
Pages: 202
Authors:
Larissa T. Moss
,
Shaku Atre
BUY ON AMAZON
Main Page
Table of content
Copyright
Addison-Wesley Information Technology Series
About the Authors
Foreword
Preface
The Purpose of This Book
How This Book Is Organized
How to Use This Book
Who Should Read This Book
Comments
Part I: Stages and Steps
Chapter Zero. Guide to the Development Steps
Business Intelligence Definition
BI Decision-Support Initiatives
Development Approaches
Engineering Stages and the Development Steps
Parallel Development Tracks
BI Project Team Structure
Justification for Using This Project Lifecycle Guide
Bibliography and Additional Reading
Chapter One. Step 1: Business Case Assessment
Business Justification
Business Drivers
Business Analysis Issues
Cost-Benefit Analysis
Risk Assessment
Business Case Assessment Activities
Deliverable Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 1
Bibliography and Additional Reading
Chapter Two. Step 2: Enterprise Infrastructure Evaluation
Step 2, Section A: Technical Infrastructure Evaluation
The Hardware Platform
The Middleware Platform
The DBMS Platform
Technical Infrastructure Evaluation Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 2, Section A
Step 2, Section B: Nontechnical Infrastructure Evaluation
The Effects of Stovepipe Development
The Need for Nontechnical Infrastructure
Enterprise Architecture
Enterprise Standards
Nontechnical Infrastructure Evaluation Activities
Deliverable Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 2, Section B
Bibliography and Additional Reading
Chapter Three. Step 3: Project Planning
Managing the BI Project
Defining the BI Project
Planning the BI Project
Project Planning Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 3
Bibliography and Additional Reading
Chapter Four. Step 4: Project Requirements Definition
General Business Requirements
Project-Specific Requirements
The Interviewing Process
Project Requirements Definition Activities
Deliverable Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 4
Bibliography and Additional Reading
Chapter Five. Step 5: Data Analysis
Business-Focused Data Analysis
Top-Down Logical Data Modeling
Bottom-Up Source Data Analysis
Data Cleansing
Data Analysis Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 5
Bibliography and Additional Reading
Chapter Six. Step 6: Application Prototyping
Purposes of Prototyping
Best Practices for Prototyping
Types of Prototypes
Building Successful Prototypes
Application Prototyping Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 6
Bibliography and Additional Reading
Chapter Seven. Step 7: Meta Data Repository Analysis
The Importance of Meta Data
Meta Data Repository as Navigation Tool
Meta Data Classifications
Meta Data Repository Challenges
The Logical Meta Model
Meta Data Repository Analysis Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 7
Bibliography and Additional Reading
Chapter Eight. Step 8: Database Design
Differences in Database Design Philosophies
Logical Database Design
Physical Database Design
Database Design Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 8
Bibliography and Additional Reading
Chapter Nine. Step 9: ExtractTransformLoad Design
Implementation Strategies
Preparing for the ETL Process
Designing the Extract Programs
Designing the Transformation Programs
Designing the Load Programs
Designing the ETL Process Flow
Evaluating ETL Tools
ETL Design Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 9
Bibliography and Additional Reading
Chapter Ten. Step 10: Meta Data Repository Design
Meta Data Silos
Meta Data Repository Solutions
Designing a Meta Data Repository
Licensing (Buying) a Meta Data Repository
Meta Data Repository Design Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 10
Bibliography and Additional Reading
Chapter Eleven. Step 11: ExtractTransformLoad Development
Source Data Transformation
Reconciliation
Peer Reviews
ETL Testing
Formal Test Plan
ETL Development Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 11
Bibliography and Additional Reading
Chapter Twelve. Step 12: Application Development
Online Analytical Processing Tools
Multidimensional Analysis Factors
Online Analytical Processing Architecture
Development Environments
Application Development Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 12
Bibliography and Additional Reading
Chapter Thirteen. Step 13: Data Mining
Defining Data Mining
Data Mining Techniques
Data Mining Operations
Applications of Data Mining
Data Mining Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 13
Bibliography and Additional Reading
Chapter Fourteen. Step 14: Meta Data Repository Development
Populating the Meta Data Repository
Meta Data Repository Interface Processes
Meta Data Repository Testing
Preparing for the Meta Data Repository Rollout
Meta Data Repository Development Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 14
Bibliography and Additional Reading
Chapter Fifteen. Step 15: Implementation
Incremental Rollout
Security Management
Data Backup and Recovery
Monitoring the Utilization of Resources
Growth Management
Implementation Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 15
Bibliography and Additional Reading
Chapter Sixteen. Step 16: Release Evaluation
The Application Release Concept
Post-Implementation Reviews
Release Evaluation Activities
Deliverables Resulting from These Activities
Roles Involved in These Activities
Risks of Not Performing Step 16
Bibliography and Additional Reading
Part II: At a Glance
Chapter Seventeen. Human Resource Allocation Matrix
Chapter Eighteen. Entry Exit Criteria and Deliverables Matrix
Chapter Nineteen. Activity Dependency Matrix
Chapter Twenty. TaskSubtask Matrix
Chapter Twenty-One. Practical Guidelines Matrix
Appendix Work Breakdown Structure
Task_Data
Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications
ISBN: 0201784203
EAN: 2147483647
Year: 2003
Pages: 202
Authors:
Larissa T. Moss
,
Shaku Atre
BUY ON AMAZON
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 3 Preventive Maintenance
Domain 6 Basic Networking
Domain 2 Installation, Configuration, and Upgrading
Domain 4 Networks
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Four Precall Planning and Research
Chapter Twelve Controlling the Buying Process
Chapter Thirteen Closing: Reaching Final Agreement
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Appendix B Solution Selling: A Scalable Approach
Microsoft VBScript Professional Projects
Errors, Constants, and Variables
Arrays
Data Collection, Notification, and Error Reporting
Developing Script Log Analyzers
Project Case Study Creating a Centralized Report Management Station
Comparing, Designing, and Deploying VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
IPsec: A Security Architecture for IP
Comparing SSL VPNs to Other Types of Remote Access VPNs
Deploying SSL VPNs (WebVPN) on the ASA 5500
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Triggers
Running Operating System Commands
Accessing the File System
MPLS Configuration on Cisco IOS Software
Cell-Mode MPLS
RIPv1 PE-CE Routing Configuration and Verification
Command Reference
Option 4: Non-VPN Transit Provider
Hierarchical VPLS-Distributed PE Architecture
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies